About

What is OZEKI.DLL and is it safe?

Below is a description of OZEKI.DLL. This application may not be safe to have on your computer. If this application is running on your computer, it is advised that you scan your computer for both viruses and malware immediately.

Click here to download SUPERAntiSpyware to block and remove OZEKI.DLL and other harmful applications.

Download SUPERAntiSpyware Now!

Summary of OZEKI.DLL

Trojan.Agent/Gen.Toolbar

Company Information

Unknown

Description of OZEKI.DLL

Randomly named Internet Explorer toolbar. Contains no version or company information and is typically installed in Windows System folder or the root Windows folder. Trojans are programs that can appear to serve a legitimate purpose but actually have an unwanted or harmful effect. A large segment of trojan programs download other harmful software components to a user's PC without his/her knowledge. This application is most likely downloaded and installed by another application that is considered to be adware or spyware.

Threat Level (1-10)

5

Processes

OZEKI.DLL

CLSID List

{24EA8786-1F55-262B-30F7-117F18136EA9}
{23CF397E-FF5C-F9B7-9221-D94766948ADB}
{D84F671A-EB13-F2A3-44E7-2B84D64A99E5}
{C4E457A6-D560-D735-1AF6-BD83363505D4}
{CF1E70B2-6818-9488-DAC4-36F068F59828}
{554BEAA6-3372-5AC0-D261-3896161A4473}
{C6368C5E-975B-8CC6-9069-67DA1BA51FDE}
{62BF7836-7767-57C1-6FBF-1AA41AED7183}
{6D3DA169-6663-42F6-847E-6E877F5941F0}
{C40D098A-4F62-3338-4D33-F6F2D675DE47}
{69014092-2059-4E84-1DBF-A3F81DD341A4}
{A8B0BDED-64A5-495B-97DA-42C0301E229B}
{FF11E082-B236-8C0C-7AAD-8C8C8EBDAD2F}
{3CE14D42-145C-6091-92CB-9FD68C0B9611}
{98BB3342-4CF9-CEE3-F1FE-917641B7B44C}
{A2F68F3E-4202-D0A3-2ADE-D9626BD49E96}
{AE84F132-F05C-A0CB-3F68-8154015F138E}
{4E7BD74F-2B8D-469E-89BE-FD60BB9AAE30}
{C30F019E-6405-2C65-CD6E-F1422877A82F}
{9BD98F4E-A5DD-8A78-7DD7-B24BCE2DCC4F}
{B971B60E-4E7F-9637-AFC6-0203255900E1}
{C9782596-917B-611E-D496-4CAA3B9BB18E}
{6B9B63BE-7C02-A15E-69D3-D26D99DC1324}
{BED58292-1E60-11DB-9B1E-F7713BCFCB49}
{836467E9-04B7-4970-B282-B3D652CBFC24}
{FC785E62-AB6F-5374-9C2F-7E46FB4E241A}
{3A32D9EE-97B0-7459-116D-D59A3B91DF59}
{EC334EFE-246C-8640-3FC4-684D2D1B61C4}
{FDB03206-EA5D-4FCF-8F90-0CF15B20B36F}
{0DCCF49D-643C-4C21-8CBB-36C4F3EDD7FA}
{4E7BD74F-2B8D-469E-A1E4-EA6FA787AD2D}
{DBBB7978-AF21-4EF4-9AD1-B2F4BC75696C}
{20EEA52F-4069-4D60-AD20-17DE2EAE67EE}
{D3618266-F57C-8495-52FC-19880119585B}
{5C419326-6F16-7F3F-6C28-075803D542B2}
{A5AF6E2A-C888-884D-0034-636EBD8F74E8}
{FA33B29E-467A-AE11-4EF4-FF60C63D6EEC}
{5FE60D61-0826-11D6-A3C8-00E0299A95BF}
{11A69AE4-FBED-4832-A2BF-45AF82825583}
{422CA3AF-86F1-4607-88E2-BBBD4E9371EB}
{2181E54F-274D-48B7-9E51-BC374933CD24}
{E3ED01B7-EAF2-4A33-989C-B95E65DA0415}
{CBF19702-9D5B-44E7-8F8A-6750209B76F3}

Return to the Malware Research page.